{"id":6423,"date":"2014-10-23T10:00:42","date_gmt":"2014-10-23T14:00:42","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=6423"},"modified":"2020-02-26T18:49:44","modified_gmt":"2020-02-26T16:49:44","slug":"full-disk-encryption-android-5","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/full-disk-encryption-android-5\/6423\/","title":{"rendered":"Android 5.0 Data Better Protected with New Crypto System"},"content":{"rendered":"<p>There\u2019s been a lot of hoopla in recent weeks over claims from Apple and Google that user content, stored in the latest iterations of the iOS and Android operating systems, is encrypted in such a way that neither company has the capacity to decrypt the locally stored information.<\/p>\n<p><strong>Crypto By Default<\/strong><\/p>\n<p>Law enforcement agencies are not happy about this new reality, because it means that even with a warrant, they\u2019ll have no sure-fire way of compelling users to decrypt locally stored data. So they\u2019ve been parading their officials around in a not-so-veiled attempt to scare the public \u2013 surely with common stories of pedophiles and terrorists \u2013 into believing <a href=\"https:\/\/threatpost.com\/mobile-device-encryption-could-lead-to-a-very-very-dark-place-fbi-director-says\/108877\" target=\"_blank\" rel=\"noopener nofollow\">encryption is bad and dangerous<\/a>.<\/p>\n<p>Meanwhile, <a href=\"https:\/\/threatpost.com\/experts-laud-changes-to-iphone-android-encryption\/108708\" target=\"_blank\" rel=\"noopener nofollow\">privacy and security advocates are heralding the new disk-encryption schemes<\/a>, which seem to equip consumers with real mobile data-security.<\/p>\n<p>Some will see these moves as reckless; others will see them as obvious reactions to an environment where it\u2019s become entirely too easy for the government to collect prosecutorial information with little to no oversight.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The newest version of #Google #Android, like #Apple #iOS, will enable full #crypto by default<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F9Fmx&amp;text=The+newest+version+of+%23Google+%23Android%2C+like+%23Apple+%23iOS%2C+will+enable+full+%23crypto+by+default\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>We wrote about <a href=\"https:\/\/www.kaspersky.co.za\/blog\/apple-new-user-data-policy\/\" target=\"_blank\" rel=\"noopener\">Apple\u2019s new, default-enabled encryption<\/a> earlier this month, and you can read that article for more on the law enforcement angle. Now it\u2019s time to talk technically about the by-default encryption that Google is touting as part of its newest Android Lollipop, also known simply as \u201cAndroid 5.0\u201d or \u201cAndroid L\u201d (because L is both the roman numeral for 50 and the first letter of the word \u201cLollipop\u201d).<\/p>\n<p><strong>A Brief History of Android Crypto<\/strong><\/p>\n<p><a href=\"http:\/\/nelenkov.blogspot.com\/\" target=\"_blank\" rel=\"noopener nofollow\">According to Nikolay Elenkov of Android Explorations<\/a>, Android users have had the option to deploy full disk encryption (FDE) since Android 3.0, also known as Honeycomb. Android\u2019s FDE offering then remained largely unchanged until Google fortified it in Android 4.4. They will strengthen that cryptographic system yet again in Android L, but more importantly, they are also turning FDE on by default for the first time in Android 5.0.<\/p>\n<p>The initial encryption scheme deployed by Google in Android was apparently quite secure. However, its implementation in the software, <a href=\"https:\/\/threatpost.com\/protesters-crypto-partiers-rally-against-surveillance-at-u-s-capitol\/102711\" target=\"_blank\" rel=\"noopener nofollow\">as is so often the case<\/a>, is where weaknesses arise. Particularly, the security of this encryption scheme depends almost entirely on the complexity of the disk encryption passphrase and its susceptibility to brute-force attacks.<\/p>\n<p>http:\/\/instagram.com\/p\/ptPZ2dv0Fj\/<\/p>\n<p>\u201cIf it is sufficiently long and complex, bruteforcing the encrypted master key could take years,\u201d Elenkov explains. \u201cHowever, because Android has chosen to reuse the lock-screen PIN or password (maximum length 16 characters), in practice most people are likely to end up with a relatively short or low-entropy disk encryption password.\u201d<\/p>\n<p>In other words: the strength of the disk encryption on Android was as strong (or weak) as your lock-screen <a href=\"https:\/\/www.kaspersky.co.za\/blog\/remember-strong-passwords\/\" target=\"_blank\" rel=\"noopener\">password<\/a>. And in most cases it is really weak because people are too lazy to set long lock-screen passwords.<\/p>\n<p>A built-in rate limiting mechanism made brute-force attacks impractical because an attacker would be <a href=\"https:\/\/www.kaspersky.co.za\/blog\/misunderstanding_the_cloud\/\" target=\"_blank\" rel=\"noopener\">locked out after a certain number of login attempts<\/a>. Of course, Elenkov circumvented this protection. If you want to wade into the details about how he managed this, feel free to read his analysis, but we won\u2019t get into that here. The point is: there is a way of brute-forcing weak PINs or passwords in order to decrypt content stored on Android devices.<\/p>\n<p>Again, this attack would be much more difficult to perform against a strong password. But if you have a typical 4 to 6 character password, you can decrypt users\u2019 data literally in only a few seconds.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Hashkill now cracks Android FDE images master password. Speed is ~135k on 6870, ~270k\/s on 7970. Android FDE is weak. <a href=\"http:\/\/t.co\/mhcvEuEP48\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/mhcvEuEP48<\/a><\/p>\n<p>\u2014 gat3way (@gat3way) <a href=\"https:\/\/twitter.com\/gat3way\/status\/328550698558029824?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 28, 2013<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In Android version 4.4, Google moved towards a stronger crypto-system. Despite this, it is still based on a PIN or password. So it is still possible to perform an attack and ultimately brute-force weak PINs and passwords, though in Android 4.4 it took a matter of minutes rather than seconds.<\/p>\n<p>Some varieties of Android 4.4 allowed users to create a separate encryption password. In this way the barrier to entry was increased, because users with separate encryption passwords were protected by two barriers (lock-screen and crypto passwords).<\/p>\n<p><strong>Enter Lollipop<\/strong><\/p>\n<div class=\"pullquote\">\u201cIn addition to enabling [full disk encryption] out of the box, Android L is expected to include hardware protection for disk encryption keys, as well as hardware acceleration for encrypted disk access.\u201d<\/div>\n<p>Such attacks will not work for Android L. The exact reason for that is unclear, because there is not yet any available source-code for the operating system. Elenkov\u2019s analysis led him to conclude that decryption key derivation is no longer based purely on a user\u2019s passphrase, PIN or lock-screen password. Instead, it seems decryption in future varieties of Android will be based only in part on the user\u2019s lock-screen PIN or password.<\/p>\n<p>Elenkov believes there will be a kind of second factor of authentication. So, in the past, the PIN or passcode alone derived the decryption key. Now, it seems the password or PIN plus some built-in, possibly hardware-based credential, derives the decryption key. Thus, brute-forcing a password may still be possible, but it won\u2019t decrypt encrypted disk space.<\/p>\n<p><strong>TL;DR<\/strong><\/p>\n<p>\u201cIn addition to enabling FDE out of the box, Android L is expected to include hardware protection for disk encryption keys, as well as hardware acceleration for encrypted disk access,\u201d Elenkov concludes. \u201cThese two features should make FDE on Android both more secure and much faster.\u201d<\/p>\n<p>In other words, most popular mobile operating system in the world finally becomes more secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google&#8217;s mobile operating system joins Apple&#8217;s iOS in offering full disk encryption by default to all users in its newest version \u2014 Android 5.0 aka Lollipop.<\/p>\n","protected":false},"author":42,"featured_media":6424,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[105,14,261,22,1250,851,584,43],"class_list":{"0":"post-6423","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-android","9":"tag-apple","10":"tag-encryption","11":"tag-google","12":"tag-ios","13":"tag-lollipop","14":"tag-mobile","15":"tag-privacy"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/full-disk-encryption-android-5\/6423\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/full-disk-encryption-android-5\/4278\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/full-disk-encryption-android-5\/4202\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/full-disk-encryption-android-5\/4720\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/full-disk-encryption-android-5\/6423\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/full-disk-encryption-android-5\/5203\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/full-disk-encryption-android-5\/6423\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/6423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=6423"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/6423\/revisions"}],"predecessor-version":[{"id":26376,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/6423\/revisions\/26376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/6424"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=6423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=6423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=6423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}